Home
last modified time | relevance | path

Searched refs:trusted (Results 1 – 25 of 34) sorted by relevance

12

/device/linaro/bootloader/arm-trusted-firmware/docs/
Dtrusted-board-boot.rst23 A Chain of Trust (CoT) starts with a set of implicitly trusted components. On
27 trusted root-key storage registers.
57 the trusted key certificate. The public part is the ROTPK.
63 one of the extension fields in the trusted world certificate.
65 - **Non-trusted world key**
69 extension fields in the trusted world certificate.
96 public part of the trusted world key and the public part of the non-trusted
101 It is self-signed with the trusted world key. It contains the public part of
111 It is self-signed with the trusted world key. It contains the public part of
120 It is self-signed with the trusted world key. It contains the public part of
[all …]
Dfirmware-design.rst57 - Boot Loader stage 3-3 (BL33) *Non-trusted Firmware*
64 - Boot Loader stage 3-3 (BL33) *Non-trusted Firmware*
71 non-trusted SRAM, ROM and DRAM.
72 - Regions accessible from only the secure state. For example, trusted SRAM and
73 ROM. The FVPs also implement the trusted DRAM which is statically
90 The BL1 data section is copied to trusted SRAM at runtime.
94 to the top of trusted SRAM as defined by the constant ``BL1_RW_BASE``.
290 #. BL1 determines the amount of free trusted SRAM memory available by
292 trusted SRAM. BL1 loads a BL2 raw binary image from platform storage, at a
294 there is not enough free trusted SRAM the following error message is
[all …]
Drt-svc-writers-guide.rst18 Software executing in the normal world and in the trusted world at exception
211 state. SMC Calls can be made from both the normal and trusted worlds and
Dfirmware-update.rst405 .. _Trusted Board Boot: ./trusted-board-boot.rst
407 .. _here: https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Image-Term…
Dchange-log.rst904 determines the exception level to use for the non-trusted firmware (BL3-3)
906 provided to BL3-1). This allows platform code to directly run non-trusted
1191 NOTE: Generic BL2 code now loads a BL3-3 (non-trusted firmware) image into
1195 NOTE: Some non-trusted firmware (e.g. UEFI) will need to be rebuilt so that
1202 BL3-2 (if present) and BL3-3 (non-trusted firmware).
1378 .. _TF wiki on GitHub: https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmwa…
1382 .. _PR#1002: https://github.com/ARM-software/arm-trusted-firmware/pull/1002#issuecomment-312650193
/device/google/cuttlefish/host/frontend/gcastv2/webrtc/certs/
Dcreate_certs.sh19 rm trusted.pem
22 openssl x509 -in server.crt -text >> trusted.pem
/device/google/cuttlefish/host/frontend/gcastv2/https/certs/
Dcreate_certs.sh19 rm trusted.pem
22 openssl x509 -in server.crt -text >> trusted.pem
/device/linaro/bootloader/arm-trusted-firmware/make_helpers/tbbr/
Dtbbr_tools.mk46 $(eval $(call FIP_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert))
47 $(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_KEY_CERT},--trusted-key-cert))
59 $(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key)))
60 $(if ${NON_TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted
/device/linaro/bootloader/arm-trusted-firmware/
Dcontributing.rst20 - `Fork`_ `arm-trusted-firmware`_ on GitHub.
22 - Create a local topic branch based on the `arm-trusted-firmware`_ ``master``
45 `automatically closed`_ when merged into the `arm-trusted-firmware`_ ``master``
86 - Submit a `pull request`_ to the `arm-trusted-firmware`_ ``integration`` branch.
117 .. _arm-trusted-firmware: https://github.com/ARM-software/arm-trusted-firmware
Dreadme.rst212 .. _GitHub: https://www.github.com/ARM-software/arm-trusted-firmware
214 .. _Security Centre: https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware…
/device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/
Dfip_create.sh35 --trusted-key-cert FILENAME Trusted key certificate
78 --trusted-key-cert | \
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/
Drexec.py539 trusted = []
544 trusted.append(a)
546 if trusted:
547 r.ok_builtin_modules = r.ok_builtin_modules + tuple(trusted)
/device/google/cuttlefish/host/frontend/gcastv2/webrtc/
DAndroid.bp162 src: "certs/trusted.pem",
163 filename: "trusted.pem",
/device/google/contexthub/util/nanoapp_sign/
Dnanoapp_sign.c238 bool trusted = false; in handleVerify() local
272 trusted = true; in handleVerify()
281 if (trusted && !lastTrusted) { in handleVerify()
284 return trusted ? 0 : 2; in handleVerify()
/device/linaro/bootloader/arm-trusted-firmware/docs/plat/
Dhikey960.rst15 `link <https://github.com/ARM-software/arm-trusted-firmware>`__
40 git clone https://github.com/ARM-software/arm-trusted-firmware -b integration
77 …${UEFI_TOOLS_DIR}/uefi-build.sh -b ${BUILD_OPTION} -a ../arm-trusted-firmware -s ../optee_os hikey…
Dhikey.rst15 `link <https://github.com/ARM-software/arm-trusted-firmware>`__
43 git clone https://github.com/ARM-software/arm-trusted-firmware -b integration
86 … ${UEFI_TOOLS_DIR}/uefi-build.sh -b ${BUILD_OPTION} -a ../arm-trusted-firmware -s ../optee_os hikey
Dpoplar.rst29 must happen prior invoking the arm trusted firmware:
40 `link <https://github.com/ARM-software/arm-trusted-firmware>`__
Dsocionext-uniphier.rst119 .. _Trusted Board Boot: ../trusted-board-boot.rst
/device/linaro/hikey/uefi-tools/
Dedk2-build.sh196 if [ -z "$ATF_DIR" -a -d "$PWD"/arm-trusted-firmware ]; then
197 ATF_DIR="$PWD"/arm-trusted-firmware
Dplatforms.config198 # https://github.com/ARM-software/arm-trusted-firmware
/device/mediatek/wembley-sepolicy/r_non_plat/
Ddomain.te24 # Purpose: allow trusted process to connect aee daemon
/device/linaro/hikey/bootloader/
DMakefile4 ATF_DIR=$(ANDROID_BUILD_TOP)/device/linaro/bootloader/arm-trusted-firmware
/device/google/cuttlefish/
Dhost_package.mk115 trusted.pem \
/device/linaro/bootloader/arm-trusted-firmware/docs/spd/
Dtlk-dispatcher.rst27 free and open-source trusted execution environment (OTE).
/device/mediatek/wembley-sepolicy/non_plat/
Ddomain.te24 # Purpose: allow trusted process to connect aee daemon

12